Blog

How can Adey Meselesh contribute to the UN SDGs?

Adey Meselesh's integration of ESG principles into its ERP system demonstrates its commitment to responsible business practices and sustainable development.

Explore more

Supply Chain Act - a use case for smart contract and blockchain

The Supply Chain Act comes into force at the beginning of 2023 and obliges large companies to document their production chains. Smart contracts and blockchain technology are one way to implement it.

Explore more

Network Security - The 10-point plan for your IT

Any weak point in your own IT infrastructure can become a point of attack for a cyber attack with unforeseeable consequences. We therefore offer our Network Security Assessment especially for SMEs without their own IT security department.

Explore more

GDPR and IT security: These obligations affect SMEs

Companies inevitably have to process personal data in their daily work. The General Data Protection Regulation (GDPR) imposes a number of requirements on data controllers to ensure IT security, which you should take into account.

Explore more

Home office as a risk for IT security?

The home office has become firmly established in the working world. It is therefore important to adapt the IT infrastructure in a timely and sustainable manner so that security is not neglected.

Explore more

Intrusion detection systems - only something for large networks?

An intrusion detection system (IDS) is designed to protect a network from hacker attacks. It detects attacks and harmful actions based on unusual activities and warns those responsible, for example, by e-mail or SMS.

Explore more

IT security for SMEs - best with a concept

Especially those responsible for SMEs that do not have their own IT department should regularly deal with the IT security of their company, for example with a security concept in which minimum standards are defined.

Explore more

Detect hacker attacks

Any hacking attack on a company can have serious consequences. There are some indications that point to a cyber attack. Taking these seriously is crucial to minimise the threat of damage.

Explore more

Digital certificates - the basis for secure communication

Digital certificates are the basis for secure communication on the internet. They are used to authenticate communication partners and initialise encryption. Therefore, users should be familiar with some basics on this topic.

Explore more

Open source vs. closed source - what does a company need to consider?

There is a charming idea behind open source: a developer makes the source code of his software available to the general public. The community may use the code free of charge, check it for errors, modify it and develop it further.

Explore more

First aid after an IT security incident

Prevention is one of the most important building blocks for the right behavior after an IT security incident.

Explore more

Cloud security - protection for outsourced data

Cloud security is increasingly becoming an elementary component of IT security in companies. Are you also thinking about outsourcing data or services to the cloud?

Explore more

Why cyber attacks can be costly

There are scenarios that would put almost any company in trouble. Regardless of a company's industry, size or organization, nearly all have one thing in common: dependence on a functioning infrastructure.

Explore more

Basic IT protection: Modular security for companies

Every company that operates an IT network needs a concept for basic IT protection.

Explore more

Cyber attacks a risk factor for businesses

The old maxim that a company's IT should cost nothing is probably considered outdated.

Explore more

Backup strategy - the emergency plan in the drawer

A backup strategy is a bit like insurance. It costs time and money to deal with it. In some circumstances, it can even be a nuisance to put in the effort required for it.

Explore more

Social engineering: When people are the weakest link in the chain

It would certainly be possible to write a text about social engineering and social hacking that does not include the wisdom "Where people work, mistakes are made!

Explore more